
Project management for technology projects that protects the budget
Most organisations can manage day-to-day change in-house. The trouble starts when the work crosses vendors, sites, or business units. At that point, project management for technology projects becomes a specialist discipline.

What a Good Penetration Test Report Should Deliver
Anyone who has ever paid for a penetration test knows the anticipation. You wait weeks to receive a comprehensive PDF filled with screenshots and urgent red text. Then, you dedicate months to transforming this information into actionable tickets, clarifying priorities, advocating for essential chang …

Passkeys in the real world
Passwords represent one of the weakest forms of security that we continue to rely on. They are easy to forget, easy to steal, and costly to manage. Every phishing breach, every instance of credential stuffing, and every password reset request serves as a reminder of a broken system we have come to a …

Long Read: NCSC 2025 Review: What CIOs Must Do as Major Attacks Surge
Empty shelves at M&S were not the real warning sign. The 50 per cent rise in nationally significant attacks was.

Deepfakes, voice clones, and AI-written lures
European Cybersecurity Month highlights social engineering for good reason. Attacks now target people more than code. Even a cloned voice or a routine approval process can lead to failures, despite having good controls in place. These issues can be avoided only if leadership recognises social engine …

Your supply chain just got stronger
Cyber Essentials Renewed Conosco has renewed Cyber Essentials Plus for another year, with the new certificate issued this October. The assessment confirms that core controls are in place, operating correctly, and applied to real devices across the environment that underpins client services. That inc …

How social engineering actually breaks a business
European Cybersecurity Month highlights social engineering for good reason. Attacks now target people more than code. Even a cloned voice or a routine approval process can lead to failures, despite having good controls in place. These issues can be avoided only if leadership recognises social engine …

Windows 10 end of support: what actually happens on 14 October 2025
Windows 10 support ends on Tuesday, 14 October 2025. That switch does not power off devices; it changes the risk. Security updates for Windows 10 stop, which means exploits widen, and insurers, auditors, and procurement officers will ask more complex questions. Microsoft is clear about what ends, an …

Penetration testing for first-timers: how to know if you need one
Most first Penetration Testing projects are bought for the wrong reason. A client asks for a certificate, cyber insurance tightens its wording, or a board member reads about an incident and wants reassurance by quarter-end. Penetration Testing is most effective when it is risk-driven and well-scoped …

Long read: what the BBC got right, and where leaders must push further
This long-form analysis responds to the BBC’s investigation, “The true cost of cyber attacks – and the business weak spots that allow them to happen,” examining the incidents that halted Jaguar Land Rover, disrupted Marks & Spencer and Co-op, and exposed the fragility of the UK’s critical supply …

When one portfolio company gets hacked, you all pay.
Portfolio companies don’t face a single cyber risk. They face a networked risk. A compromise at one portfolio company often exposes shared vendors, credentials, and processes that repeat across the rest of the fund. That’s aggregation. It’s why ransomware and supply-chain attacks scale so efficientl …

In-house security vs outsourced: who wins on ROI, and productivity
Security can be a powerful catalyst for productivity, not a burden to bear. The right operating model frees engineers to build, removes friction from change, and shortens recovery when something goes wrong. For most UK organisations outside the very largest enterprises, managed security delivers fas …
